Na RUAN
TitleCited byYear
When CSI meets public WiFi: Inferring your mobile phone password via WiFi signals
M Li, Y Meng, J Liu, H Zhu, X Liang, Y Liu, N Ruan
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
852016
DoS attack-tolerant TESLA-based broadcast authentication protocol in Internet of Things
N Ruan, Y Hori
2012 International Conference on Selected Topics in Mobile and Wireless …, 2012
342012
SPFM: Scalable and privacy-preserving friend matching in mobile cloud
M Li, N Ruan, QY Qian, H Zhu, X Liang, L Yu
IEEE Internet of Things Journal 4 (2), 583-591, 2016
152016
Privacy-preserving selective aggregation of online user behavior data
J Qian, F Qiu, F Wu, N Ruan, G Chen, S Tang
IEEE Transactions on Computers 66 (2), 326-338, 2016
142016
Toward optimal dos-resistant authentication in crowdsensing networks via evolutionary game
N Ruan, L Gao, H Zhu, W Jia, X Li, Q Hu
2016 IEEE 36th International Conference on Distributed Computing Systems …, 2016
102016
Efficient and enhanced broadcast authentication protocols based on multilevel μTESLA
X Li, N Ruan, F Wu, J Li, M Li
2014 IEEE 33rd International Performance Computing and Communications …, 2014
102014
WiFind: Driver fatigue detection with fine-grained Wi-Fi signal features
W Jia, H Peng, N Ruan, Z Tang, W Zhao
IEEE Transactions on Big Data, 2018
92018
On the Strategy and Behavior of Bitcoin Mining with N-attackers
H Liu, N Ruan, R Du, W Jia
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
82018
Crowdsourced time-sync video tagging using semantic association graph
W Yang, N Ruan, W Gao, K Wang, W Ran, W Jia
2017 IEEE International Conference on Multimedia and Expo (ICME), 547-552, 2017
72017
A generic evaluation method for key management schemes in wireless sensor network
R Na, Y Ren, Y Hori, K Sakurai
Proceedings of the 5th International Conference on Ubiquitous Information …, 2011
72011
De-anonymizing social networks: Using user interest as a side-channel
S Lai, H Li, H Zhu, N Ruan
2015 IEEE/CIC International Conference on Communications in China (ICCC), 1-5, 2015
62015
Privacy-preserving mining of association rules for horizontally distributed databases based on FP-tree
Y Jin, C Su, N Ruan, W Jia
International Conference on Information Security Practice and Experience …, 2016
52016
Automatic detection of SIP-aware attacks on VoLTE device
S Zhang, L Zhou, ML Wu, Z Tang, N Ruan, H Zhu
2016 IEEE 84th Vehicular Technology Conference (VTC-Fall), 1-5, 2016
52016
Performance analysis of key management schemes in wireless sensor network using analytic hierarchy process
N Ruan, Y Ren, Y Hori, K Sakurai
2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011
52011
Privacy-preserving fraud detection via cooperative mobile carriers with improved accuracy
W Yao, N Ruan, F Yu, W Jia, H Zhu
2017 14th Annual IEEE International Conference on Sensing, Communication …, 2017
42017
A differentially private selective aggregation scheme for online user behavior analysis
J Qian, F Qiu, F Wu, N Ruan, G Chen, S Tang
2015 IEEE Global Communications Conference (GLOBECOM), 1-6, 2015
42015
Elliptic curve ElGamal threshold-based key management scheme against compromise of distributed RSUs for VANETs
N Ruan, T Nishide, Y Hori
Information and Media Technologies 7 (4), 1588-1595, 2012
42012
Threshold ElGamal-based key management scheme for distributed RSUs in VANET
N Ruan, T Nishide, Y Hori
2011 International Conference on Selected Topics in Mobile and Wireless …, 2011
42011
A novel broadcast authentication protocol for internet of vehicles
N Ruan, M Li, J Li
Peer-to-Peer Networking and Applications 10 (6), 1331-1343, 2017
32017
Who moved my cheese: Towards automatic and fine-grained classification and modeling Ad network
J Liu, J Liu, H Li, H Zhu, N Ruan, D Ma
2016 IEEE Global Communications Conference (GLOBECOM), 1-6, 2016
32016
The system can't perform the operation now. Try again later.
Articles 1–20